A method and system are described for using business artifacts to identify elements of a component business model. Artifacts operated upon by the business are first identified, and then used to analyze the business into business operations. This is done by identifying every business activity that acts on an artifact, creating directed graphs for the business activities, and decomposing the directed graphs into sub-graphs, each sub-graph representing a business operation and being annotated by a verb expression, the annotated sub-graph representing a business service. The business services are then clustered into non-overlapping components, using common affinities reflected in the verb expressions, and organized by partitioning into internal and external operations, exposing a business service for each external operation. The components are then clustered into non-overlapping business competencies, and arranged by accountability level.
|
1. A computer implemented method for using business artifacts to identify elements of a component business model of a business, comprising the steps of:
identifying at least one business artifact and providing a computerized representation of said business artifact as input for identifying one or more component business model (cbm) elements;
accessing a cbm repository providing a cbm meta model specifying each cbm element and its relationship to every other cbm element;
accessing a local database providing storage for application logic;
analyzing, using a processor and said application logic, each said business artifact, wherein the analyzing comprises:
identifying activities of the business that act on the artifact,
ordering the identified business activities into a directed graph representing the life cycle of the artifact,
identifying one or more cleave points for decomposing said directed graph into sub-graphs that perform a sequence of said business activities,
each said cleave point being located at a place that minimizes the transfer of data and messages between business processes while maximizing the locality of information within the business process and
each said sequence being a business service,
decomposing said directed graph into sub-graphs at each of said one or more cleave points,
grouping business services based on mutual affinities, each said grouping of business services being a component,
organizing the business services into sets consolidating duplicate functions,
partitioning said business services into those internal and those external to the component,
clustering sets of components by mutual affinities, each said clustered set of components being a business competency, and
arranging the business components into accountability levels within a cbm map; and
specifying a component business model of the business as an output, said output identifying all cbm elements of the business in accordance with said cbm meta model.
|
This invention is related to commonly owned patent application Ser. No. 11/176,371 for “SYSTEM AND METHOD FOR ALIGNMENT OF AN ENTERPRISE TO A COMPONENT BUSINESS MODEL” which is incorporated by reference herein.
1. Field of the Invention
The present invention generally relates to component based business models and, more particularly, to techniques for using business artifacts to discover and refine elements of a component business model.
2. Background Description
Various role players within the enterprise need to understand how the business performs its operations and activities in order to effectively manage the business and to enable business transformation. Business elements that comprise a component business model are often difficult to identify, analyze and specify. This is especially so when creating a component business model without the use of any established templates or guides. Even where there are generalized industry templates, business elements that are extracted and reused from these templates need to be customized to the needs of an individual business enterprise.
What is needed is an improved methodology for identifying elements of a component business model.
An aspect of the invention is a method for identifying elements of a component business model, comprising identifying artifacts operated on by a business, using the artifacts to analyze the business into business services, clustering the business services into non-overlapping components and clustering the components into non-overlapping competencies. In another aspect of the invention, using the artifacts to analyze the business further comprises, for each identified artifact, identifying every business activity that acts on the artifact during a lifecycle of the artifact, creating a directed graph for the identified business activities, decomposing the directed graph into sub graphs, each sub graph representing a sequence of activities at a level of granularity suitable for the business, and annotating each sub graph with a verb expression, each sub graph representing a business operation and each annotated sub graph representing a business service.
In a further aspect of the invention, clustering into components further comprises clustering the business services into components and, for each said component cluster, organizing the business services into sets consolidating duplicate functions and partitioning the business services external to the component from the business services internal to the component, each external business service being exposed by the component. Another aspect of the invention further comprises arranging each component in each competency by accountability level within a component business model map. Yet another aspect of the invention further comprises rationalizing the components and competencies to insure that each established service exposed by a component is called by another component with no orphans. In a further aspect, where a component business model of the business already exists, the invention further comprises determining whether any business operation created from analysis using an artifact is new to the existing component business model and, for any business operation determined to be new and also determined to be an external operation in a component, establishing a business service exposed by the component.
The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
It is therefore an object of the present invention to enable a standardized method and system for identifying elements in a component business model for representing a business enterprise. By elements we mean business components, business operations, business activities, business services and business competencies that comprise a component business model.
Another object of the invention is to provide various role players within the enterprise, including executive management, business operation teams, business analysts, IT architects, and program/project managers better ways of identifying, analyzing and specifying various elements that comprise a component business model.
A further object of the invention is to enable business transformation.
The invention uses the Component Business Model (CBM) described in related patent application Ser. No. 11/176,371 for “SYSTEM AND METHOD FOR ALIGNMENT OF AN ENTERPRISE TO A COMPONENT BUSINESS MODEL” (hereafter termed “the above referenced foundation patent application”). CBM provides a logical and comprehensive view of the enterprise, in terms that cut across commercial enterprises in general and industries in particular. The component business model as described in the above referenced foundation patent application is based upon a logical partitioning of business activities into non-overlapping managing concepts, each managing concept being active at the three levels of management accountability: providing direction to the business, controlling how the business operates, and executing the operations of the business. The term “managing concept” is specially defined as described in the above referenced foundation patent application, and is not literally a “managing concept” as that phrase would be understood in the art. For the purpose of the present invention, as for the related invention, “managing concept” is the term associated with the following aspects of the partitioning methodology. First, the methodology is a partitioning methodology. The idea is to begin with a whole and partition the whole into necessarily non-overlapping parts. Second, experience has shown that the partitioning process works best when addressed to an asset of the business. The asset can be further described by attributes. Third, the managing concept must include mechanisms for doing something commercially useful with the asset. For a sensibly defined managing concept these mechanisms must cover the full range of management accountability levels (i.e. direct, control and execute). Managing concepts are further partitioned into components, which are cohesive groups of activities. The boundaries of a component usually fall within a single management accountability level. It is important to emphasize that the boundaries between managing concepts (and between components within managing concepts) are logical rather than physical.
The method of the invention begins with an initial identification of business artifacts, items which are operated upon (e.g. by adding or modifying information content identified with the item). For each artifact, the business activities that act on the artifact are identified and a directed graph representing the life cycle of the artifact is constructed from these identified business activities. If a business activity creates or receives new artifacts not previously known, these are added to those initially identified.
Each directed graph is decomposed into sub-graphs that perform sequences of activities, each sequence being a business operation. The level of granularity of distinct business operations is chosen to be suitable for the particular business being analyzed. Each business operation is given a verb expression reflecting a business service performed by the business operation.
When all the artifacts have been processed in this fashion, the business services are clustered into ‘bags’ reflecting mutual affinities. These clusters are business components. The business services within a bag are then organized into sets, consolidating duplicate functions. The services within a bag are then partitioned to identify those which are internal to the business component and those which are external, i.e. those that provide services to other components or receive services from other components.
Finally, the business components are clustered into sets that contain mutual affinities. These clustered sets define business competencies. Within a competency, the business components are arranged into accountability levels within a CBM map of the business.
Referring now to the drawings, and more particularly to
The business service 120 provided by business component 110 is enabled by business operation 130, which describes what the business actually does. The business operation 130 consists of business artifacts, business activities that work on artifacts, topology of connections between the business activities, and resources, people and technology that support the activities. Business activity 135 is something the business does at a level of granularity that is chosen by the business. It is connected in two directions to link 140, which is driven by business operation 130. Business activity 135 is expressed in a service invocation activity 145, which is a business activity that requires that a business service be invoked. Business activities may: (1) link to other business activities; (2) invoke other business operations that reside internal to the component; or (3) invoke business services that are exposed by business components. Business activity 135 is an example of the latter.
The method of the invention provides a more precise means, involving less subjectivity, for identifying CBM elements and how the business operates. Business artifacts describe, in information terms and at a business level, what the business produces or processes (e.g. a healthcare insurance enterprise might be in the business of processing written requests prepared by claimants, called “Claims”). By using business artifacts, business activities 135 can be elicited by asking the questions—“How do you recognize an artifact that you can work on?” and “What information do you add to this artifact as part of your processing?” Business activities 125 which process artifacts, and the connection topology between them, characterize business operation 130.
The method of using business artifacts to identify CBM elements results in a new, unique and innovative process to discover new CBM elements or validate and improve the definition of existing CBM elements, including business components, business operations, business activities, business services and business competencies that comprise a Component Business Model. Both business competencies and business components rely on operations that process artifacts—thus artifacts provide an effective mechanism for insights into business components and business competencies. For example, business services provided by a business component can be identified and/or rationalized in terms of the artifacts that the business component processes and maintains. A business service is in one of three categories. It may provide information that is available from artifacts in the component. It may update the information content of artifacts in the component. Finally, it may transfer the actual artifact to the requester.
The artifact method of identifying CBM elements describes two conditions where CBM elements can be identified: first, it may be used where the CBM map or CBM elements have not previously been identified; second, it may be used where the structure of the CBM and the CBM elements has been specified but requires validation and modification.
The method presented describes various steps in the technique to identify new or validate existing CBM elements. First, it establishes the lifecycle of an artifact and creates a directed graph of all the business activities that act on it. Second, it applies a technique of “cleave points” resulting in an improved way of decomposing an entire enterprise within the Component Business Model structure. The analysis of cleave points is enabled by a decomposition of directed graphs of business activities which apply to the lifecycle of the business artifact. Cleave points are a sensible decomposition or breaking up of a large directed graph into smaller business processes that are suitable in size for the business and results in the identification of business operations and business services. Finally, it applies clustering techniques to business services to discern and identify business components, and then clusters business components to identify business competencies.
A discussion on the nature of a business artifact, its lifecycle and the tasks that act on it is discussed in U.S. Pat. No. 6,662,355 to Caswell et al. By following the artifact lifecycle we identify all the business activities that act on the artifact and construct a picture of the life of the artifact from cradle to grave. This is represented in the directed graph of business activities. This graph may be overwhelmingly complex and additional analysis is required to decompose the lifecycle, at appropriate cleave points, into an assemblage of chunks suitable in size for the business.
A standard for identifying a cleave point is one that locates the cleave point at a place that minimizes the transfer of data and messages between business processes, while maximizing the locality of information within the business process. Analysis of these business processes through aggregation and their subsequent re-composition is a leading indicator for business component identification and validation.
The method of using business artifacts to identify CBM elements also involves a process of clustering basic pieces of function into more complex aggregations, (e.g. a business operation is an aggregation of multiple business activities.) To accomplish this grouping a concept of “mutual affinities” is applied. By mutual affinities we mean the identification of related function, data and behavior between two or more common elements. Clustering can be accomplished through any one of several known and recognized approaches, including conceptual clustering (two or more elements belong to the same cluster if the cluster is defined by a concept common to the elements) distance-based clustering (the similarity criterion between two or more elements if they are “close” according to a metric based on the shared affinity between them), or semantic analysis of element names and their descriptions.
The behavior of the CBM Artifact Method (for example, the granularity of CBM elements) can be controlled through the specification of preferred ranges for criteria analysis. An example of this is the specification of an ideal number of components, competencies, or services that comprise a given CBM. The central notion of using business artifacts is that what the business actually does' can be described using artifacts. These descriptions are more easily understood by business people, especially those with operational responsibility, and also have enough information to facilitate the building of automation systems to support the business.
A business artifact is a concrete and identifiable container of business information, a container that makes sense to a business person. Artifacts are discussed in U.S. Pat. No. 6,662,355 to Caswell et al., and their use is extended as described in the present invention to discover elements of component business models. Examples of an artifact are an order, a customer record, or a guest check in a restaurant. ‘What a business actually does’ can be described as a network of business tasks through which an artifact flows. A simple example of an order artifact flowing through three business tasks is shown in
A business activity is idle until an artifact arrives. The activity adds to the artifact the information that it has been trained to add and passes it on. Each business activity has enough knowledge to recognize an artifact and to process it in accordance with the requirements of the business.
Turning now to
Then the selected artifact is used to identify the various business activities that act on the artifact and order them into a directed graph representing the life cycle of the artifact 225. This part of the analysis may be understood with reference to
In the course of constructing a directed graph describing the life cycle of the artifact, additional artifacts may be identified, as shown generically by item 230 in
At this point in the analysis the identified artifacts (e.g. catalog request 320 through shipping record 326) are evaluated to determine whether any new artifacts have been identified 235, and if so the new artifacts are added 240 to the collection of artifacts to be analyzed 215, as shown by the dotted line in
Continuing with
The foregoing steps (items 220 through 245 in
The business services that have been identified are grouped into bags that reflect mutual affinities 255. It may be that many business services may have been identified which may make clustering directly into business components difficult. To ameliorate this problem an intermediate clustering is proposed which is illustrated in
An example of intermediate clustering based on major categories is shown in
Similarly, the account order 341 business service has been grouped with calculate tax 361, issue report 362 and international pricing 363 under the common affinity “finance” 360. Fulfill order 342 business service has been grouped with shipping report 371, inventory report 372 and order tracking 373 under the common affinity “distribution” 370. And archive order 343 business service has been grouped with order assessment 381 and business planning 382 under the common affinity “business assets” 380.
The clusters of business services having mutual affinities are the nascent foundations for business components. These bags of business services are further refined using clustering to more narrow and specialized mutual affinity criteria that generate business components suitable in size and character to the nature of the business. These refined mutual affinity clusters reflect a partitioning that meets the definition of a “business component” described in the above referenced foundation patent application. That is, each refined affinity cluster reflects a business component that enables a center of related business services activities, which are non-overlapping. The business services within a cluster are organized into cohesive groups of activities, which are the business components of the CBM model. For each component, the business services are organized to consolidate duplicate functions and eliminate overextensions. An example of organizing business services of an affinity cluster into components is shown in
Returning to
As shown in
The main elements of the preferred embodiment of the invention may be summarized with reference to
The tool 550 for realizing the artifact method can support an interactive user interface or an automated program that follows the CBM artifact method described above to produce a new or modified component business model for the business. The output 530 of the tool 550 is a valid and verified specification of the component business model for a business, including all CBM elements. The output 530 may represent a report, a file of structured information or a presentation on an end user interface.
While the invention has been described in terms of a single preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.
Nigam, Anil, Flaxer, David Bernard, Rackham, Guy Jonathan James, Vergo, John George
Patent | Priority | Assignee | Title |
10360612, | Apr 19 2004 | Consolidation of product data models | |
7739080, | Apr 19 2004 | VERSATA DEVELOPMENT GROUP, INC | Consolidation of product data models |
8225283, | Jan 31 2005 | International Business Machines Corporation | Method and apparatus for enabling collaborative product development processes |
Patent | Priority | Assignee | Title |
20030079200, | |||
20070021993, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 09 2005 | FLAXER, DAVID BERNARD | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017358 | /0223 | |
Nov 09 2005 | RACKHAM, GUY JONATHAN JAMES | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017358 | /0223 | |
Nov 14 2005 | VERGO, JOHN GEORGE | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017358 | /0223 | |
Nov 21 2005 | NIGAM, ANIL | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017358 | /0223 | |
Jan 10 2006 | International Business Machines Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jul 27 2009 | ASPN: Payor Number Assigned. |
Mar 25 2013 | REM: Maintenance Fee Reminder Mailed. |
Aug 11 2013 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Aug 11 2012 | 4 years fee payment window open |
Feb 11 2013 | 6 months grace period start (w surcharge) |
Aug 11 2013 | patent expiry (for year 4) |
Aug 11 2015 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 11 2016 | 8 years fee payment window open |
Feb 11 2017 | 6 months grace period start (w surcharge) |
Aug 11 2017 | patent expiry (for year 8) |
Aug 11 2019 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 11 2020 | 12 years fee payment window open |
Feb 11 2021 | 6 months grace period start (w surcharge) |
Aug 11 2021 | patent expiry (for year 12) |
Aug 11 2023 | 2 years to revive unintentionally abandoned end. (for year 12) |